Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
24532b6718d3665f61db9982be0fa5a6_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
24532b6718d3665f61db9982be0fa5a6_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
24532b6718d3665f61db9982be0fa5a6
-
SHA1
de1d4721719be5814041d99a4559fdcb5296c985
-
SHA256
fc52e505c69f58c26100ca9bb35c3f39bc35dd9864d7f8dd5ebd119e730b51e5
-
SHA512
e73462d6a299bc8bb208e704136061424aeff0f73e3d067ab37d08b2eb84a4a18de9baa937cfb7f22a3aec27fb1f91ba0af779c01beb9157c9dcecc8a0461d5d
-
SSDEEP
24576:suYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:E9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-6-0x0000000002CF0000-0x0000000002CF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 3024 msconfig.exe 1576 isoburn.exe 1492 mblctr.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 3024 msconfig.exe 1244 Process not Found 1576 isoburn.exe 1244 Process not Found 1492 mblctr.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qntpnaypazzlupr = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\PDC5AD~1\\isoburn.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2040 1244 Process not Found 30 PID 1244 wrote to memory of 2040 1244 Process not Found 30 PID 1244 wrote to memory of 2040 1244 Process not Found 30 PID 1244 wrote to memory of 3024 1244 Process not Found 31 PID 1244 wrote to memory of 3024 1244 Process not Found 31 PID 1244 wrote to memory of 3024 1244 Process not Found 31 PID 1244 wrote to memory of 640 1244 Process not Found 32 PID 1244 wrote to memory of 640 1244 Process not Found 32 PID 1244 wrote to memory of 640 1244 Process not Found 32 PID 1244 wrote to memory of 1576 1244 Process not Found 33 PID 1244 wrote to memory of 1576 1244 Process not Found 33 PID 1244 wrote to memory of 1576 1244 Process not Found 33 PID 1244 wrote to memory of 1544 1244 Process not Found 35 PID 1244 wrote to memory of 1544 1244 Process not Found 35 PID 1244 wrote to memory of 1544 1244 Process not Found 35 PID 1244 wrote to memory of 1492 1244 Process not Found 36 PID 1244 wrote to memory of 1492 1244 Process not Found 36 PID 1244 wrote to memory of 1492 1244 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24532b6718d3665f61db9982be0fa5a6_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2040
-
C:\Users\Admin\AppData\Local\mSXMcGT\msconfig.exeC:\Users\Admin\AppData\Local\mSXMcGT\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3024
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:640
-
C:\Users\Admin\AppData\Local\UYSwQO\isoburn.exeC:\Users\Admin\AppData\Local\UYSwQO\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1576
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:1544
-
C:\Users\Admin\AppData\Local\Ah3a3xWD\mblctr.exeC:\Users\Admin\AppData\Local\Ah3a3xWD\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54dfdb990012f0fff0cae0d15198c4ef4
SHA17cbce6f8e4cb0b3c5da82f71f71027319a369d6a
SHA2562f721037be3cabe32d28df997e368769cee854a2e697630a836bdebea73b3908
SHA51288396217f869f8521ede84ce4af042076133f630fedfd13cd221fa9ffacc1fbdcafa479b901bf9eea582791a855cfeb4bca8b05b6da07cac9fa3dddab67306e0
-
Filesize
1.2MB
MD556e7b535d8677ec953fe562826af65cd
SHA1a3874357a69e38cf2a60bbc4afa13ed65904f06a
SHA25678cad39e978cb9796876d020b4670ec7db00996d60703354cdf3b17eba72e7c0
SHA512f67588b51f4acd0e76745dc520bff2602d41b5c78535843109bc50245afb71077064fd88d199771e49bcdb41dea88effe0f9194cbac7a26546e71b5a7761f8ed
-
Filesize
1.2MB
MD5941acb5c7043677831577f62b80b241f
SHA1cbbb5dedd2bdc45c47cc69ac4706cff3e37f4c8b
SHA256d827a6ce644a1ec6b31e34b4136fa748b480eb92ad73973c2e27cb2d137aaa00
SHA512eeab5585d84ca86612d3799122b80315b282cc28805b93bffcb4faf888be71ec43feb11cf0b4f51c6ca19de5023f0cc1da8511582a45eaf6ba89560c38ba72d7
-
Filesize
875B
MD5770fe916ddeb9596a8546e5f3ad6730d
SHA12fbb0d07c093c99aa39549a3a06aa98ddb91772b
SHA2565c86f4c08c3bc2424eb69b24f164f15d7c108e531e6fc543fd33d648385b27f6
SHA512ad60a07416c4c74aa1395667263bfd1faa0696354319a9c29a68d4024087edb0197310f586b4a9d9f7c3da9c70e4e18d40355c2d2b2ae7dc8bef979e36d46fd0
-
Filesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
Filesize
89KB
MD5f8051f06e1c4aa3f2efe4402af5919b1
SHA1bbcf3711501dfb22b04b1a6f356d95a6d5998790
SHA25650dcb4be409f50d26c0fc32dd9cdbf96bff4e19bf624221cb566ebeb3e09ce1a
SHA5125f664d937abe4426ee7e0d8491a395f9ef4ffe7a51dba05b54b7ba27e80c9be37833400911c5878d3dec659f4fa1579ec8ba4cfc485fb2ce24dd37c321006daa
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283